<img alt="" src="https://secure.leadforensics.com/89462.png" style="display:none;">
The Pros & Cons of Self-administered BGP Diversion

The Pros & Cons of Self-administered BGP Diversion

Should network owners count on third parties - and in this case Nexusguard - in provisioning for and executing network traffic route diversions? That’s not a loaded question. While we absolutely possess the experience and hands-on skills the network owner can trust, many network owners may still ..

Read More >

All White Papers

    The Pros & Cons of Self-administered BGP Diversion

    Should network owners count on third parties - and in this case Nexusguard - in provisioning for and executing network traffic route diversions? That’s not a loaded question. While we absolutely possess the experience and hands-on skills the network owner can trust, many network ... Learn More

    InfraProtect vs Origin Protection - A Comparison Guide

    InfraProtect and Origin Protection provide on-demand attack mitigation, protecting your infrastructure (and downstream) against network DDoS attacks of all sizes and types. Both solutions prevent valuable bandwidth from being saturated with malicious traffic and help maintain ... Learn More

    Turn DDoS challenge into opportunity for CSPs

    Faced with evolving DDoS attack patterns and tactics that are more difficult to detect and mitigate, communications service providers (CSPs) are presented with a dilemma. Should they just pass on the attack traffic, knowingly or unknowingly, to the victim customer? Rather than a ... Learn More

    Origin Protection for Large Networks

    Protecting a network from malicious and attack traffic is what we are committed to doing to our best at Nexusguard. Our Origin Protection (OP) is architected to protect backend networks. But for enterprises or organizations managing a vast network, such as those managing ... Learn More

    Surviving GDPR Means Success in New Internet Era

    Effective from 25 May 2018, the General Data Protection Regulation (GDPR) imposed by the European Union (EU) is undeniably daunting and part of it is deliberately vague for online businesses to comply with. Generally speaking, the legislation empowers web users from the EU to ... Learn More

    DNSSEC: The Global Chain of Trust

    Often described as the Internet phonebook, DNS is fundamentally important to the Internet. DNS also inherits various design, implementation and configuration vulnerabilities. One of those is the threat of DNS cache poisoning, which needs another security protocol, known as DNS ... Learn More

    DDoS Survival Guide

    DDoS attacks could come in various forms that debilitate your entire national internet infrastructure and lead to severe aftermath. Almost anyone can fall victim to a DDoS attack but not everyone know how to defend it. Read our DDoS Survival Guide to help you and your team to ... Learn More

    Understanding Mitigation for Modern DDoS Attacks

    DDoS attacks have real financial and operational costs. Fortunately, there are several ways to mitigate an attack. Learn about the benefits and limitations of various mitigation solutions, how DDoS attacks have changed in recent years, and the steps you should take to keep your ... Learn More

    The Omnipresence of IoT Poses Unprecedented Challenges for Cybersecurity

    As the Internet of Things (IoT) evolves and expands into different territories of daily life, the potential surface for DDoS attacks—sometimes combined with infiltration attempts—is growing exponentially. As these devices are generally designed with lightweight security, ... Learn More

    Best Practices for Traffic Log Collection

    The collection and storage of log data is integral to Nexusguard’s comprehensive mitigation and analysis processes. The purpose is to know what is going on within the network in order to better detect and mitigate attack traffic. This White Paper addresses the most common ... Learn More

    The Hidden Danger Behind DDoS Attacks

    As DDoS attacks continue to evolve in scale, frequency and sophistication, they are increasingly used to disguise more serious forms of cybercrime. The financial services sector is a prime target of DDoS attacks, as witnessed by a series of high profile hits on major Wall Street ... Learn More
    Load More